Unencrypted Bluetooth Low Energy baseband links in Bluetooth Core Specifications 4.0 through 5.2 may permit an adjacent device to inject a crafted packet during the receive window of the listening device before the transmitting device initiates its packet transmission to achieve full MITM status without terminating the link. When applied against devices establishing or using encrypted links, crafted packets may be used to terminate an existing link, but will not compromise the confidentiality or integrity of the link.
References
Link | Resource |
---|---|
https://bluetooth.com | Vendor Advisory |
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/injectable/ | Vendor Advisory |
https://bluetooth.com | Vendor Advisory |
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/injectable/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://bluetooth.com - Vendor Advisory | |
References | () https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/injectable/ - Vendor Advisory |
Information
Published : 2021-06-25 12:15
Updated : 2024-11-21 06:06
NVD link : CVE-2021-31615
Mitre link : CVE-2021-31615
CVE.ORG link : CVE-2021-31615
JSON object : View
Products Affected
bluetooth
- bluetooth_core_specification
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')